06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

A.9 Sirett-Mayes-Markantonakis (SM) Protocol<br />

The SP sends the root certicate of the mobile phone's J2ME Operator domain. This<br />

enables the SP to install its own MIDlet on the mobile phone that will assist it in the<br />

applet installation on the SIM card (SC).<br />

SM-2. SC → M → SP : SC i ||N SC<br />

The SC will send its identity and a random number back to the SP via the M using the<br />

Short Message Server (SMS). The SM protocol relies on the SMS to provide security to<br />

certain messages.<br />

On receipt, the SP use the SC identity to locate the long-term shared secret between the<br />

SC and SP.<br />

SM-3. SP → M : MIDlet SP ||Sign SP (MIDlet SP )<br />

The SP then encrypt and MAC the applet that it wants to install on the SC. The encrypted<br />

and MACed applet is then embedded in the MIDlet SP that the SP sends to the M that<br />

installs it in the operator domain of the mobile phone. The MIDlet SP is signed by the SP<br />

signature key that is certied by the root entity to the operator domain (i.e. Cert DRP C ).<br />

SM-4. M → SC : e KSC−SP (Applet)||f KSC−SP (Applet)<br />

Once the MIDlet SP is installed on the M it communicates with the SC and initiate the<br />

applet download process which is described by the message 4.<br />

239

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!